全文获取类型
收费全文 | 6965篇 |
免费 | 199篇 |
国内免费 | 27篇 |
专业分类
电工技术 | 104篇 |
综合类 | 6篇 |
化学工业 | 1420篇 |
金属工艺 | 284篇 |
机械仪表 | 184篇 |
建筑科学 | 104篇 |
矿业工程 | 8篇 |
能源动力 | 314篇 |
轻工业 | 284篇 |
水利工程 | 56篇 |
石油天然气 | 14篇 |
无线电 | 984篇 |
一般工业技术 | 1513篇 |
冶金工业 | 864篇 |
原子能技术 | 72篇 |
自动化技术 | 980篇 |
出版年
2023年 | 72篇 |
2022年 | 150篇 |
2021年 | 180篇 |
2020年 | 157篇 |
2019年 | 149篇 |
2018年 | 234篇 |
2017年 | 193篇 |
2016年 | 200篇 |
2015年 | 108篇 |
2014年 | 211篇 |
2013年 | 406篇 |
2012年 | 226篇 |
2011年 | 306篇 |
2010年 | 236篇 |
2009年 | 277篇 |
2008年 | 247篇 |
2007年 | 200篇 |
2006年 | 208篇 |
2005年 | 155篇 |
2004年 | 127篇 |
2003年 | 130篇 |
2002年 | 129篇 |
2001年 | 126篇 |
2000年 | 129篇 |
1999年 | 112篇 |
1998年 | 264篇 |
1997年 | 182篇 |
1996年 | 131篇 |
1995年 | 130篇 |
1994年 | 104篇 |
1993年 | 133篇 |
1992年 | 108篇 |
1991年 | 97篇 |
1990年 | 84篇 |
1989年 | 75篇 |
1988年 | 72篇 |
1987年 | 75篇 |
1986年 | 88篇 |
1985年 | 106篇 |
1984年 | 99篇 |
1983年 | 95篇 |
1982年 | 78篇 |
1981年 | 63篇 |
1980年 | 49篇 |
1979年 | 46篇 |
1978年 | 49篇 |
1977年 | 62篇 |
1976年 | 82篇 |
1975年 | 43篇 |
1973年 | 42篇 |
排序方式: 共有7191条查询结果,搜索用时 15 毫秒
81.
Gupta Kapil Kumar Nath Baikunth Kotagiri Ramamohanarao 《Dependable and Secure Computing, IEEE Transactions on》2010,7(1):35-49
Intrusion detection faces a number of challenges; an intrusion detection system must reliably detect malicious activities in a network and must perform efficiently to cope with the large amount of network traffic. In this paper, we address these two issues of Accuracy and Efficiency using Conditional Random Fields and Layered Approach. We demonstrate that high attack detection accuracy can be achieved by using Conditional Random Fields and high efficiency by implementing the Layered Approach. Experimental results on the benchmark KDD '99 intrusion data set show that our proposed system based on Layered Conditional Random Fields outperforms other well-known methods such as the decision trees and the naive Bayes. The improvement in attack detection accuracy is very high, particularly, for the U2R attacks (34.8 percent improvement) and the R2L attacks (34.5 percent improvement). Statistical Tests also demonstrate higher confidence in detection accuracy for our method. Finally, we show that our system is robust and is able to handle noisy data without compromising performance. 相似文献
82.
Effect of geometry on droplet formation in the squeezing regime in a microfluidic T-junction 总被引:1,自引:0,他引:1
In the surface tension-dominated microchannel T-junction, droplets can be formed as a result of the mixing of two dissimilar,
immiscible fluids. This article presents results for very low Capillary numbers and different flow rates of the continuous
and dispersed phases. Through three-dimensional lattice Boltzmann-based simulations, the mechanism of the formation of “plugs”
in the squeezing regime has been examined and the size of the droplets quantified. Results for
Re\textc << 1 Re_{\text{c}} \ll 1 show the dependence of flow rates of the two fluids on the length of the droplets formed, which is compared with existing
experimental data. It is shown that the size of plugs formed decreases as the Capillary number increases in the squeezing
regime. This article clearly shows that the geometry effect, i.e., the widths of the two channels and the depth of the assembly,
plays an important role in the determination of the length of the plugs, a fact that was ignored in earlier experimental correlations. 相似文献
83.
Recovery of sensor embedded washing machines using a multi-kanban controlled disassembly line 总被引:1,自引:0,他引:1
Product recovery involves the recovery of materials and components from returned or end-of-life products. Disassembly, an element of product recovery, is the systematic separation of an assembly into its components, subassemblies or other groupings. Stricter environmental regulations together with dramatic decrease in natural resources and landfills have increased the importance of disassembly as all product recovery options require some level of disassembly. Due to changes made during the lifetime of a product by customers or service personnel, the number and the version of components prior to disassembly is unknown. Customers may also discriminate between and demand different versions of components. The existence of non-functional components further adds to the uncertainty associated with disassembly yield. Sensors implanted into products during their production can address this uncertainty by providing information on the number, condition and version of components prior to disassembly. In this study, we evaluate the impact of sensor embedded products (SEPs) on the various performance measures of a washing machine (WM) disassembly line controlled by a multi-kanban system, which takes into consideration the highly stochastic behavior of the line while managing material and kanban flows. First, separate design of experiments studies based on orthogonal arrays are performed for conventional products and SEPs. In order to observe the response of each experiment, detailed discrete event simulation (DES) models for both types of products are developed considering the precedence relationships among the components of a WM. Then, pair-wise t-tests are conducted to compare the two cases based on different performance measures. According to the results, SEPs provide significant reductions in all costs (viz., backorder, holding, disassembly, disposal, testing and transportation) while increasing revenue and profit. 相似文献
84.
Examining knowledge contribution from the perspective of an online identity in blogging communities 总被引:1,自引:0,他引:1
Knowledge contribution is one of the essential factors behind the success of blogging communities (BCs). This research studies knowledge contribution behavior in a BC from the perspective of knowledge contributors and their characteristics using the lens of social identity theory. Social identity theory asserts that individuals are fundamentally motivated to present or communicate their identities in everyday social life through behavior. A similar line of reasoning can be used to argue that members of a BC would also be motivated to communicate their online identities through their behavior, that is, through knowledge contribution in the BC. Specifically, this study conceptualized the online identity and examined the effects of its personal (online kindness, online social skills, and online creativity) and social aspects (BC involvement) on knowledge contribution. The data was collected using an online survey from the members of Cyworld, a popular BC in South Korea and a few other countries (members from South Korea were included in this study). The results indicate that both the personal and social aspects of online identity and their interactions significantly influenced knowledge contribution. Based on the findings, this study offers suggestions to organizers of BCs to enhance the knowledge contribution from their members. 相似文献
85.
Software reliability is one of the most important quality attributes of commercial software. During software testing, software reliability growth models (SRGMs) are commonly used to describe the phenomenon of failure occurrence and/or fault removal which consequently enhancements software reliability. Large software systems are developed by integrating a number of relatively small and independent modules, which are tested independently during module testing phase. The amount of testing resource available is limited which is desired to be consumed judiciously so as to optimize the testing process. In this paper we formulate a resource allocation problem of minimizing the cost of software testing under available amount of testing resource, given a reliability constraint. We use a flexible SRGM considering testing effort which, depending upon the values of parameters, can describe either exponential or S-shaped failure pattern of software modules. A systematic and sequential Algorithm is proposed to solve the optimization problem formulated. Numerical examples are given to illustrate the formulation and solution procedures. Sensitivity analysis is performed to examine the behavior of some parameters of SRGM with most significant influence. 相似文献
86.
Multi-stage molding is capable of producing better-quality articulated products at a lower cost. During the multi-stage molding process, assembly operations are performed along with the molding operations. Hence, it gives rise to a new type of planning problem. It is difficult to perform the planning manually because it involves evaluating large number of combinations and solving complex geometric reasoning problems. This paper investigates the problem of generating multi-stage molding plans for articulated assemblies. We present a planning framework that allows us to utilize constraints from experimentally proven molding plans. As a part of the planning problem, we determine the molding sequence and intermediate assembly configurations. We present algorithms for all the steps in the planning problem and characterize their computational complexities. Finally, we illustrate our approach with representative examples. 相似文献
87.
With the advent of multicores, multithreaded programming has acquired increased importance. In order to obtain good performance, the synchronization constructs in multithreaded programs need to be carefully implemented. These implementations can be broadly classified into two categories: busy–wait and schedule‐based. For shared memory architectures, busy–wait synchronizations are preferred over schedule‐based synchronizations because they can achieve lower wakeup latency, especially when the expected wait time is much shorter than the scheduling time. While busy–wait synchronizations can improve the performance of multithreaded programs running on multicore machines, they create a challenge in program debugging, especially in detecting and identifying the causes of data races. Although significant research has been done on data race detection, prior works rely on one important assumption—the debuggers are aware of all the synchronization operations performed during a program run. This assumption is a significant limitation as multithreaded programs, including the popular SPLASH‐2 benchmark have busy–wait synchronizations such as barriers and flag synchronizations implemented in the user code. We show that the lack of knowledge of these synchronization operations leads to unnecessary reporting of numerous races. To tackle this problem, we propose a dynamic technique for identifying user‐defined synchronizations that are performed during a program run. Both software and hardware implementations are presented. Furthermore, our technique can be easily exploited by a record/replay system to significantly speedup the replay. It can also be leveraged by a transactional memory system to effectively resolve a livelock situation. Our evaluation confirms that our synchronization detector is highly accurate with no false negatives and very few false positives. We further observe that the knowledge of synchronization operations results in 23% reduction in replay time. Finally, we show that using synchronization knowledge livelocks can be efficiently avoided during runtime monitoring of programs. Copyright © 2009 John Wiley & Sons, Ltd. 相似文献
88.
Santosh Ghosh Author Vitae Monjur Alam Author Vitae Author Vitae Indranil Sen Gupta Author Vitae 《Computers & Electrical Engineering》2009,35(2):329-338
All elliptic curve cryptographic schemes are based on scalar multiplication of points, and hence its faster computation signifies faster operation. This paper proposes two different parallelization techniques to speedup the GF(p) elliptic curve multiplication in affine coordinates and the corresponding architectures. The proposed implementations are capable of resisting different side channel attacks based on time and power analysis. The 160, 192, 224 and 256 bits implementations of both the architectures have been synthesized and simulated for both FPGA and 0.13μ CMOS ASIC. The final designs have been prototyped on a Xilinx Virtex-4 xc4vlx200-12ff1513 FPGA board and performance analyzes carried out. The experimental result and performance comparison show better throughput of the proposed implementations as compared to existing reported architectures. 相似文献
89.
Gupta Abhinav Kembhavi Aniruddha Davis Larry S. 《IEEE transactions on pattern analysis and machine intelligence》2009,31(10):1775-1789
Interpretation of images and videos containing humans interacting with different objects is a daunting task. It involves understanding scene/event, analyzing human movements, recognizing manipulable objects, and observing the effect of the human movement on those objects. While each of these perceptual tasks can be conducted independently, recognition rate improves when interactions between them are considered. Motivated by psychological studies of human perception, we present a Bayesian approach which integrates various perceptual tasks involved in understanding human-object interactions. Previous approaches to object and action recognition rely on static shape/appearance feature matching and motion analysis, respectively. Our approach goes beyond these traditional approaches and applies spatial and functional constraints on each of the perceptual elements for coherent semantic interpretation. Such constraints allow us to recognize objects and actions when the appearances are not discriminative enough. We also demonstrate the use of such constraints in recognition of actions from static images without using any motion information. 相似文献
90.
Mohammad Alshibli Ahmed El Sayed Elif Kongar Tarek M. Sobh Surendra M. Gupta 《Journal of Intelligent and Robotic Systems》2016,82(1):69-79
End-of-life disassembly has developed into a major research area within the sustainability paradigm, resulting in the emergence of several algorithms and structures proposing heuristics techniques such as Genetic Algorithm (GA), Ant Colony Optimization (ACO) and Neural Networks (NN). The performance of the proposed methodologies heavily depends on the accuracy and the flexibility of the algorithms to accommodate several factors such as preserving the precedence relationships during disassembly while obtaining near- optimal and optimal solutions. This paper improves a previously proposed Genetic Algorithm model for disassembly sequencing by utilizing a faster metaheuristic algorithm, Tabu search, to obtain the optimal solution. The objectives of the proposed algorithm are to minimize (1) the traveled distance by the robotic arm, (2) the number of disassembly method changes, and (3) the number of robotic arm travels by combining the identical-material components together and hence eliminating unnecessary disassembly operations. In addition to improving the quality of optimum sequence generation, a comprehensive statistical analysis comparing the previous Genetic Algorithm and the proposed Tabu Search Algorithm is also included 相似文献